An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).
Sec+ Quiz - 1

Quiz
•
Computers
•
Professional Development
•
Medium
Isabella S
Used 34+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 2 pts
The hashing method
The encryption method
The registration authority
The certificate authority
The back-end directory source
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?
On-path
Domain hijacking
DNS poisoning
Evil twin
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?
Netstat
Ping
ssh
Ipconfig
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?
Lessons learned
Preparation
Detection
Containment
Root cause analysis
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether it is modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?
Check the hash of the installation file
Match the file names
Verify the URL download location
Verify the code-signing certificate
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?
Embedded Python code
Macro-enabled file
Bash scripting
Credential-harvesting website
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?
Snapshot
Differential
Cloud
Full
Incremental
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Coding & Logic - Lesson 1

Quiz
•
Professional Development
15 questions
CloudBinary_Apache_Tomcat_Quiz- 2

Quiz
•
Professional Development
17 questions
MOC 20744C-Securing Windows Server 2016 - Part 2

Quiz
•
Professional Development
15 questions
ITF - Quiz 9.5 - DNS and URLs

Quiz
•
Professional Development
20 questions
SOAL ULANGAN ASJ KELAS XII TKJ

Quiz
•
Professional Development
10 questions
Public Key Infrastructure

Quiz
•
Professional Development
20 questions
101-120

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 3

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade